Analysis
-
max time kernel
94s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:34
Behavioral task
behavioral1
Sample
eaae4c580b336d583788d60af7db9a56_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eaae4c580b336d583788d60af7db9a56_JaffaCakes118.pdf
Resource
win10v2004-20240910-en
General
-
Target
eaae4c580b336d583788d60af7db9a56_JaffaCakes118.pdf
-
Size
70KB
-
MD5
eaae4c580b336d583788d60af7db9a56
-
SHA1
c3db9d539844ffd01e28423f2746a1b426b5d8c7
-
SHA256
f0ee6a5b6c350a6200bec1d3b00e19655ebb9fa7cc5fca84e2c71ccf0914277d
-
SHA512
b90da5c5cfcaed295183e575e144f8258c807b34a81c527ab5009d74a84d0572e6944986779ab2db8b60483474f4dacc61d9479852fb0710fc3b5b24ce897c35
-
SSDEEP
1536:8GF4p/CVuo56QaUvBqEMtstUHtfvaRotFuBoFkKYkX8hISgObLJl:ZF4p5s6HUpSts2HtfBtFuBoFkKYkXRSn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2536 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2536 AcroRd32.exe 2536 AcroRd32.exe 2536 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eaae4c580b336d583788d60af7db9a56_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c91bc3b7f52d76ad27dcf1f747755f4c
SHA183b1a2dc59c1cea7364b5b8918ba2e23828ef31a
SHA2562ba8a3bdf31471cc8595751bed824ad867b668699a22a8b0e42d6f9b34088c1f
SHA512d8d68f7ad15baed571d709242c89cd59a64026fc5d8344e149a28c93f841cabb21674b3eb2e9368c8b97b3d4aa949bc1c1f35fbeac4a93a446fcff9b2d2d4800